cloud-metadata

Fail

Audited by Socket on May 4, 2026

2 alerts found:

Malwarex2
MalwareHIGH
references/credential-extraction.md

The provided fragment is highly indicative of malicious intent: it provides a concrete, multi-cloud playbook for extracting temporary instance metadata credentials and using them to enumerate and access high-value resources (including secrets and object storage), with optional recursive downloading of potentially sensitive content. This behavior aligns strongly with cloud credential theft and post-exploitation discovery/exfiltration patterns rather than benign software functionality.

Confidence: 82%Severity: 98%
MalwareHIGH
SKILL.md

MALICIOUS. The skill’s stated purpose is offensive exploitation: abusing SSRF/shell access to query cloud metadata, extract temporary credentials, read user-data secrets, and pivot into cloud API enumeration and privilege-escalation workflows. The footprint is internally consistent, but it is consistent with an attack playbook for credential theft and unauthorized cloud access.

Confidence: 97%Severity: 99%
Audit Metadata
Analyzed At
May 4, 2026, 08:16 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fcloud-metadata%2F@1b15cfa768a8a5916b9a45034e9b7fb16e536f7a